First published: Mon Mar 16 2020(Updated: )
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Micrologix 1400 A Firmware | ||
Rockwellautomation Micrologix 1400 B Firmware | <=21.001 | |
Rockwellautomation Micrologix 1400 | ||
Rockwellautomation Micrologix 1100 Firmware | ||
Rockwellautomation Micrologix 1100 | ||
Rockwellautomation Rslogix 500 | <=12.001 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-6988.
The severity of CVE-2020-6988 is high, with a severity value of 7.5.
The affected software of CVE-2020-6988 includes Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, and RSLogix 500 Software v12.001 and prior.
Yes, Rockwellautomation Micrologix 1400 A Firmware is vulnerable to CVE-2020-6988.
To fix CVE-2020-6988, it is recommended to apply the necessary patches and updates provided by Rockwell Automation.